4.5 out of 5
4.5
221 reviews on Udemy

Ethical Hacking and Network Security from Scratch 2021

Ethical Hacking skills to get ahead. Learn how Hackers hack networks and devices and how to secure them.Learn Kali Linux
Instructor:
Andrei Dumitrescu
2,596 students enrolled
English
Practical Ethical Hacking and Penetration Testing Skills
Learn How to set up a Hacking Lab (Kali Linux, Metasploitable, VMs).
You will MASTER Ethical Hacking and Network Security Key Concepts (Reconnaissance, Sniffing, Exploitation ...).
Acquire the Skills to MITIGATE ALL THE ATTACKS presented in the course.
Learn How to Hack Routers and IoT Devices using RouterSploit.
Learn How to Hack Systems using Metasploit.
Learn How to Hack WiFi Networks (Traffic Sniffing and Injection, Deauthentication Attack, WPA2 Cracking).
Learn How to Secure a WiFi Network and stay safe and anonymous while browsing the Web.
Learn How to implement Full Disk Encryption.
Learn How to Hack ARP (Poisoning, Ettercap, Bettercap, Caplets, Ban, ...).
Learn How to Hack STP.
Learn How to Hack CDP.
Learn How to Hack Switches.
Acquire an In-Depth Understanding of Steganography and How to Hide Secret Data.
Learn about the tools used for Cracking Passwords (John the Ripper, Hydra, Rainbow Tables, rcrack).
Acquire an In-Depth Understanding of GnuPG (symmetric and asymmetric encryption, key management, digital signatures).
Acquire an In-Depth Understanding of Hashes and How to Break them.
Learn How to Hack HTTPS (SSL Sniffing, SSL Stripping, HTTPS Downgrade).
Learn How to Hack DHCP (Flooding, Starvation, Roque Server).
Learn How to Hack Google Searches (Google Dorks).
Learn How to use Shodan to discover and Hack IoT devices.
Acquire In-Depth Sniffing Techniques (Wireshark, Filters, tcpdump, airodump-ng).
Acquire In-Depth Scanning Techniques using Nmap, Nmap Scripting Engine, Zenmap, arp-scan and netdiscover.
Acquire an In-Depth Understanding of Netfilter/Iptables Linux Firewall (Chains, Tables, Matches, Targets).

This course IS NOT like any other Ethical Hacking courses you can take online. At the end of this course, you will MASTER the key concepts and you will become an Ethical Hacker and Network Security Expert.

This is a brand new Ethical Hacking and Network Security Applied course launched in April 2020 and it’s updated to teach you the skills required for the future that comes.

Course Updates:

  • Update: November 2020 – Updates to be 2021 ready.

  • Update: October 2020 – NEW Video: Hacking Linux by running DoS attacks without root access (Fork Bomb)

  • Update: June 2020NEW Section: Anonymity and Privacy (Web Tracking, Onion Routing, Tor, Tor Hidden Services – Dark Web, Deep Web)

  • Update: May 2020NEW Section: Vulnerability Assessment Systems – OpenVAS

  • Course Launch: April 15, 2020

The world is changing, constantly, and at a fast pace! The technology-driven future in which we’ll live is filled with promise but also challenges. This Ethical Hacking course is really different! You’ll learn what really matters and you’ll get the skills to get ahead and gain an edge.

I won’t teach you how to run an exploit on a vulnerable application that will be patched in a few days and will not work anymore. Instead, I’ll teach you the network security principles that will last for years to come using a practical approach but without neglecting the theory which is the base of a deep understanding.

Do you want to learn a new valuable skill, get hired, get a promotion, or simply prepare for the future that comes? Well, then this course is for you! By enrolling in this course now, you make the best investment in your career!

Given the surge in the cyber-security threats, millions of new jobs will open across the industry and the global digital security spending will exceed hundreds of billions of dollars in the years to come.

After this course, you’ll have an in-depth understanding of how hackers think and behave.

This course is for you if you want to learn Ethical Hacking and Network Security applied to the real-world.

It’s specially designed for you whether you have no experience in Network Security, you’ve taken other related courses and you want to level up your skills, or you are coming from other fields like Network and System administration or Programming.

You’ll have access to my closed and exclusive online Group in order to provide you with improved, faster, and better support for your course-related questions.

This course is taught by me, a Senior Network Engineer and Professional Trainer. Why should you learn from me?

  • I’m a Practitioner and an Enthusiast. Welcome to the real world! I entered the Network Security world 15 years ago. I’m not just a random guy that teaches Ethical Hacking and Network Security. Just imagine that during this time I’ve learned and applied more and more almost on a daily basis. And now I’m giving everything to you!

  • I’m an Educator and I know how to make a Curriculum. I know exactly what is important and what is not. For the last 10 years, I’ve trained thousands of people on Security, Networking, and Programming.

  • You’ll learn not only some commands and tools but also advanced concepts for real-world jobs that will last. After this course, you’ll be an effective Ethical Hacker!

You’ll have lifetime access and you can return and look for a specific hack or countermeasure anytime you want. And let’s not forget, if you don’t like the course, you are covered by a 30-day money-back guarantee, full refund, no questions asked!

The topics covered in this Hands-On Ethical Hacking and Network Security Applied course are:

  • Setting the Hacking Environment (Kali Linux, Metasploitable, VMs)

  • Use Kali to Hack Networks and Devices

  • Hacking Routers and IoT Devices using RouterSploit

  • Hacking anything with Metasploit

  • Hacking Linux

  • Cryptography In-Depth (Hashes, Digital Signature, Encryption)

  • Attacks on Hash Algorithms

  • Full Disk Encryption (Data at rest protection)

  • GnuPG In Depth

  • Steganography In Depth

  • Hiding files in other files

  • Anonymity and Privacy (Web Tracking, Onion Routing, Tor, Tor Hidden Services – Dark Web, Deep Web)

  • Cracking Passwords (John & Hydra)

  • Rainbow Tables

  • Information Gathering (Reconnaissance)

  • Nmap & Zenmap, Nmap Scripting Engine (NSE)

  • arp-scan & net-discover

  • Hacking Google Searches In Depth

  • Shodan

  • Vulnerability Assessment Systems – OpenVAS

  • Sniffing Traffic (Wireshark & tcpdump)

  • Hacking WiFi Networks

  • Hacking WPA2

  • Hacking ARP (Ettercap & Bettercap)

  • Hacking HTTPS

  • Hacking DNS

  • Hacking DHCP

  • Hacking Cisco Devices

  • Hacking Switches

  • Hacking STP

  • Mitigating all attacks presented in the course

Every topic includes many live examples in Kali Linux, a command section, quizzes, slides, and many practice challenges.

The skills you’ll learn will broaden your horizons and could change your life.

Getting Started

1
Why Ethical Hacking? Why Now?
2
IMPORTANT. Please read!
3
How to Get the Most Out of This Course
4
Getting Course Resources
5
How to Get Better and Faster Support? JOIN OUR ONLINE COMMUNITY!

Setting the Hacking Environment

1
The Hacking Lab Environment
2
Installing Kali Linux in a VM
3
Kali and Linux Mint Download Links (OVA Files)
4
Things to Do After Installing Kali
5
Quiz for Setting the Lab

Hackings Systems

1
Hacking Routers and IoT Devices using RouterSploit
2
Exploiting the Default Gateway Using RouterSploit
3
Commands - RouterSploit
4
Installing Metasploitable and Setting the Penetration Testing Network
5
Hacking Anything: Metasploit Demo
6
Setting Up and Updating Metasploit
7
Using msfconsole
8
The Metasploit Workflow
9
Hacking Linux: Running a DoS Attack Without root Access
10
Commands - Metasploit
11
Quiz for Hacking Systems

Challenges - Hacking Systems

1
Challenges - RouterSploit
2
Challenges - Metasploit

Cryptography and Steganography

1
Intro to Hashes
2
Commands - Hashes
3
The Properties of Hash Algorithms
4
The Application of Hash Algorithms
5
Attacks on Cryptographic Hash Algorithms
6
Quiz for Hashes
7
Intro to Full Disk Encryption
8
Full Disk Encryption Using dm-crypt and LUKS
9
Unlocking LUKS Encrypted Drives With A Keyfile
10
Commands - Full Disk Encryption
11
Full Disk Encryption Solution using VeraCrypt (Windows, Mac and Linux)
12
Quiz for Full Disk Encryption
13
Intro to GnuPG
14
Symmetric Encryption Using GnuPG
15
GnuPG Key Management
16
GnuPG Key Servers
17
Asymmetric Encryption Using GnuPG
18
Digital Signing using GnuPG
19
Asymmetric Encryption and Digital Signing using GnuPG
20
Commands - GnuPG (gpg)
21
Quiz for GnuGP
22
Using an Encrypted Text Editor (EncryptPad)
23
Steganography Explained
24
Steganography In Depth
25
Hide Secret Messages Through Steganography with Steghide
26
Commands - Steganography
27
Quiz for Steganography

Challenges - Cryptography and Steganography

1
Challenges - Hashes
2
Challenges - GPG
3
Challenges - Steganography (steghide)

Cracking Passwords

1
Understanding /etc/passwd and /etc/shadow files
2
Intro to Cracking Passwords
3
Cracking Linux Passwords Using John the Ripper
4
John the Ripper Advanced
5
Commands - John the Ripper (JTR)
6
Cracking Passwords Countermeasures
7
Cracking Service Passwords with Hydra
8
Commands - Hydra
9
Rainbow Tables Explained
10
Cracking Hashes Using RainbowCrack (rtgen & rcrack)
11
Cracking Hashes Countermeasures
12
Commands - Cracking Hashes Using Rainbow Tables
13
Quiz for Cracking Passwords

Challenges - Cracking Passwords

1
Challenges - John the Ripper and Hydra
2
Challenges - Rainbow Tables

Anonymity and Privacy (Web Tracking, Onion Routing, Tor, Dark Web)

1
How Does Online Tracking Really Work
2
Staying Anonymous Online: Incognito vs. VPN/Proxy vs. Tor vs. Tails
3
Using Disposable Email Addresses
4
Protecting Your Phone Number
5
Intro to Onion Routing and Tor
6
Onion Routing and Tor In Depth
7
Installing and Running the Tor Browser
8
Tor vs. VPN
9
The Layers of the Web: Surface Web, Deep Web and Dark Web
10
Surface Web vs. Dark Web Anonymity
11
Through the Dark Web. Is it worth it?
12
Tor Weaknesses and Security Best Practices

Information Gathering And Vulnerability Assessment

1
Intro to Reconnaissance
2
Scanning Networks with Nmap
3
Nmap Advanced
4
Commands - Nmap
5
Quiz for Nmap
6
Nmap Scripting Engine (NSE)
7
Commands - NSE
8
Zenmap
9
Comparing Nmap Scan Results
10
ARP Scanning (arp-scan and netdiscover)
You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4.5
4.5 out of 5
221 Ratings

Detailed Rating

Stars 5
139
Stars 4
58
Stars 3
21
Stars 2
2
Stars 1
1
30-Day Money-Back Guarantee

Includes

15 hours on-demand video
39 articles
Full lifetime access
Access on mobile and TV
Certificate of Completion
Ethical Hacking and Network Security from Scratch 2021
Price:
$158.98 $129

Community

For Professionals

For Businesses

We support Sales, Marketing, Account Management and CX professionals. Learn new skills. Share your expertise. Connect with experts. Get inspired.

Community

Partnership Opportunities

Layer 1
samcx.com
Logo
Register New Account
Compare items
  • Total (0)
Compare
0